openSUSE: 2024:0129-1: important: the Linux Kernel Security Advisory Update
Description
The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic() on the socket that the SKB is queued on (bsc#1218447). * CVE-2023-6610: Fixed an out of bounds read in the SMB client when printing debug information (bsc#1217946). * CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559). * CVE-2020-26555: Fixed an issue during BR/EDR PIN code pairing in the Bluetooth subsystem that would allow replay attacks (bsc#1179610 bsc#1215237). * CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that cou...
Read the Full Advisory
Patch
## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Real Time Module 15-SP4 zypper in -t patch SUSE-SLE-Module-RT-15-SP4-2024-129=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-129=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-129=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-129=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-129=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-129=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-129=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-129=1
Package List
* SUSE Real Time Module 15-SP4 (x86_64) * kernel-rt-devel-debuginfo-5.14.21-150400.15.65.1 * kernel-rt-debuginfo-5.14.21-150400.15.65.1 * kernel-rt_debug-debuginfo-5.14.21-150400.15.65.1 * gfs2-kmp-rt-debuginfo-5.14.21-150400.15.65.1 * kernel-rt_debug-devel-5.14.21-150400.15.65.1 * cluster-md-kmp-rt-5.14.21-150400.15.65.1 * dlm-kmp-rt-debuginfo-5.14.21-150400.15.65.1 * kernel-rt-devel-5.14.21-150400.15.65.1 * ocfs2-kmp-rt-debuginfo-5.14.21-150400.15.65.1 * cluster-md-kmp-rt-debuginfo-5.14.21-150400.15.65.1 * kernel-syms-rt-5.14.21-150400.15.65.1 * ocfs2-kmp-rt-5.14.21-150400.15.65.1 * dlm-kmp-rt-5.14.21-150400.15.65.1 * kernel-rt_debug-debugsource-5.14.21-150400.15.65.1 * kernel-rt_debug-devel-debuginfo-5.14.21-150400.15.65.1 * kernel-rt-debugsource-5.14.21-150400.15.65.1 * gfs2-kmp-rt-5.14.21-150400.15.65.1 * SUSE Real Time Module 15-SP4 (noarch) * kernel-devel-rt-5.14.21-150400.15.65.1 * kernel-source-rt-5.14.21-150400.15.65.1 * SUSE Real Time Module 15-SP4 (nosrc x86_64) * kernel-rt_debug-5.14.21-150400.15.65.1 * kernel-rt-5.14.21-150400.15.65.1 * openSUSE Leap Micro 5.3 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.65.1 * openSUSE Leap Micro 5.3 (x86_64) * kernel-rt-debuginfo-5.14.21-150400.15.65.1 * kernel-rt-debugsource-5.14.21-150400.15.65.1 * openSUSE Leap Micro 5.4 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.65.1 * openSUSE Leap Micro 5.4 (x86_64) * kernel-rt-debuginfo-5.14.21-150400.15.65.1 * kernel-rt-debugsource-5.14.21-150400.15.65.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.65.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64) * kernel-rt-debuginfo-5.14.21-150400.15.65.1 * kernel-rt-debugsource-5.14.21-150400.15.65.1 * SUSE Linux Enterprise Micro 5.3 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.65.1 * SUSE Linux Enterprise Micro 5.3 (x86_64) * kernel-rt-debuginfo-5.14.21-150400.15.65.1 * kernel-rt-debugsource-5.14.21-150400.15.65.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.65.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64) * kernel-rt-debuginfo-5.14.21-150400.15.65.1 * kernel-rt-debugsource-5.14.21-150400.15.65.1 * SUSE Linux Enterprise Micro 5.4 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.65.1 * SUSE Linux Enterprise Micro 5.4 (x86_64) * kernel-rt-debuginfo-5.14.21-150400.15.65.1 * kernel-rt-debugsource-5.14.21-150400.15.65.1 * SUSE Linux Enterprise Live Patching 15-SP4 (x86_64) * kernel-livepatch-SLE15-SP4-RT_Update_17-debugsource-1-150400.1.3.1 * kernel-livepatch-5_14_21-150400_15_65-rt-debuginfo-1-150400.1.3.1 * kernel-livepatch-5_14_21-150400_15_65-rt-1-150400.1.3.1
References
* bsc#1179610 * bsc#1183045 * bsc#1193285 * bsc#1211162 * bsc#1211226 * bsc#1212584 * bsc#1214747 * bsc#1214823 * bsc#1215237 * bsc#1215696 * bsc#1215885 * bsc#1216057 * bsc#1216559 * bsc#1216776 * bsc#1217036 * bsc#1217217 * bsc#1217250 * bsc#1217602 * bsc#1217692 * bsc#1217790 * bsc#1217801 * bsc#1217933 * bsc#1217938 * bsc#1217946 * bsc#1217947 * bsc#1217980 * bsc#1217981 * bsc#1217982 * bsc#1218056 * bsc#1218139 * bsc#1218184 * bsc#1218234 * bsc#1218253 * bsc#1218258 * bsc#1218335 * bsc#1218357 * bsc#1218447 * bsc#1218515 * bsc#1218559 * bsc#1218569 * bsc#1218659 * jsc#PED-3459 * jsc#PED-5021 * jsc#PED-7322 ## References: * https://www.suse.com/security/cve/CVE-2020-26555.html * https://www.suse.com/security/cve/CVE-2023-51779.html * https://www.suse.com/security/cve/CVE-2023-6121.html * https://www.suse.com/security/cve/CVE-2023-6531.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2023-6606.html * https://www.suse.com/security/cve/CVE-2023-6610.html * https://www.suse.com/security/cve/CVE-2023-6622.html * https://www.suse.com/security/cve/CVE-2023-6931.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1179610 * https://bugzilla.suse.com/show_bug.cgi?id=1183045 * https://bugzilla.suse.com/show_bug.cgi?id=1193285 * https://bugzilla.suse.com/show_bug.cgi?id=1211162 * https://bugzilla.suse.com/show_bug.cgi?id=1211226 * https://bugzilla.suse.com/show_bug.cgi?id=1212584 * https://bugzilla.suse.com/show_bug.cgi?id=1214747 * https://bugzilla.suse.com/show_bug.cgi?id=1214823 * https://bugzilla.suse.com/show_bug.cgi?id=1215237 * https://bugzilla.suse.com/show_bug.cgi?id=1215696 * https://bugzilla.suse.com/show_bug.cgi?id=1215885 * https://bugzilla.suse.com/show_bug.cgi?id=1216057 * https://bugzilla.suse.com/show_bug.cgi?id=1216559 * https://bugzilla.suse.com/show_bug.cgi?id=1216776 * https://bugzilla.suse.com/show_bug.cgi?id=1217036 * https://bugzilla.suse.com/show_bug.cgi?id=1217217 * https://bugzilla.suse.com/show_bug.cgi?id=1217250 * https://bugzilla.suse.com/show_bug.cgi?id=1217602 * https://bugzilla.suse.com/show_bug.cgi?id=1217692 * https://bugzilla.suse.com/show_bug.cgi?id=1217790 * https://bugzilla.suse.com/show_bug.cgi?id=1217801 * https://bugzilla.suse.com/show_bug.cgi?id=1217933 * https://bugzilla.suse.com/show_bug.cgi?id=1217938 * https://bugzilla.suse.com/show_bug.cgi?id=1217946 * https://bugzilla.suse.com/show_bug.cgi?id=1217947 * https://bugzilla.suse.com/show_bug.cgi?id=1217980 * https://bugzilla.suse.com/show_bug.cgi?id=1217981 * https://bugzilla.suse.com/show_bug.cgi?id=1217982 * https://bugzilla.suse.com/show_bug.cgi?id=1218056 * https://bugzilla.suse.com/show_bug.cgi?id=1218139 * https://bugzilla.suse.com/show_bug.cgi?id=1218184 * https://bugzilla.suse.com/show_bug.cgi?id=1218234 * https://bugzilla.suse.com/show_bug.cgi?id=1218253 * https://bugzilla.suse.com/show_bug.cgi?id=1218258 * https://bugzilla.suse.com/show_bug.cgi?id=1218335 * https://bugzilla.suse.com/show_bug.cgi?id=1218357 * https://bugzilla.suse.com/show_bug.cgi?id=1218447 * https://bugzilla.suse.com/show_bug.cgi?id=1218515 * https://bugzilla.suse.com/show_bug.cgi?id=1218559 * https://bugzilla.suse.com/show_bug.cgi?id=1218569 * https://bugzilla.suse.com/show_bug.cgi?id=1218659 * https://jira.suse.com/login.jsp * https://jira.suse.com/login.jsp * https://jira.suse.com/login.jsp